Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
7e1bdf7dd719e0b0c373394a1de155c7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7e1bdf7dd719e0b0c373394a1de155c7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e1bdf7dd719e0b0c373394a1de155c7_JaffaCakes118.html
-
Size
2KB
-
MD5
7e1bdf7dd719e0b0c373394a1de155c7
-
SHA1
87f49823e5705de0dc6fa9f70c17fb9889161cf7
-
SHA256
5fd4a745019864941f73298896b75cc301d831b63674a6b032ed66d51b9f1c96
-
SHA512
0489e0913ca170855384962754740cb1a648212eed51637cc4c36dbaaf8874afdc6af8bded19f3bb55d62e0c27f0e8308fa0a2454892e209696767bffc9dcb45
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1039f4f534b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004eca2f97d980b448833e679420067a0000000000020000000000106600000001000020000000f488d2db5ec20dc2d266978080961481318866d674d3f2d32bcc5cd8dad7008f000000000e800000000200002000000065099ad333fadba10e68d53e863c4020b2b276012c7bae35db22b3cf5801bf9420000000465ed1d0d20e8f60e964d55263619b9de2869023c7be318d7034e3771845ae3240000000ad2a795d6990a71aeb32f6b092e3adce3081db5abf4c016b2ad3456b906da54f3577a24aa09acf9f13fb4ca407345249b0ce4d1a78f9d0f021d598a77e6d8db5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423086234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{212A14B1-1D28-11EF-BF93-66356D7B1278} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2500 2040 iexplore.exe 28 PID 2040 wrote to memory of 2500 2040 iexplore.exe 28 PID 2040 wrote to memory of 2500 2040 iexplore.exe 28 PID 2040 wrote to memory of 2500 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e1bdf7dd719e0b0c373394a1de155c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513d0b9c6c31622838255ea68a702a354
SHA1eb1f0efad29e6992ab2e554fd98da14bb545bc3f
SHA256bb4f3cb2975749eed0c133717ebd2d795bae3d7fdf2c1fa8a19f27daffd992c1
SHA512394f2db4d22f938ece1ccc04fb5e92582d522f9d4edbe5a8e0fac6d288b40d6be48b10a55f12af53b769b4b1a3bcc98c273686ba710fbedb1e20d3a35f2175ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c7d95c681b46f63a6a8ade4d4973b1
SHA129f7f979a2ca2752b0bc76311f6c4efb08f456f2
SHA256b8287fef5a8ec26cbc51d5c0c949ccbfafb02b7f5f5fe04860c6d618d060a426
SHA512ccf14cf906f69f1a4620056d7efa3d283b927ac46601b6825dba6e3a2a0a6d0e8844b4fa3c7a7dfaebf6a5088cbaa335995f799fe10312722782df55333c5dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5079d258b1a42caa169f94deda553f4ed
SHA19b8d87334c6fb72395b3578b091c3f1ba3106a03
SHA256d08d28f1322c64f09a84cae3d03253185e71ace8ad400d429542752fefd9f1c1
SHA5120f03f3b0e20b683bb836ce040344aa6252f90b2c078473169d9303ed89fb109147279b6256e505b416a96001284089d8dca9230cdbc93a7c902f64dbee206a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5409282d0627e1285cb128b291c952025
SHA1ced996cc0a0676d420ae328195103a5fbf24bb65
SHA2566e1cf52ef4335769861409e6334301cf3d580ccc06251a703eb56f280d73f8d4
SHA5122a30527dd0ad6fbdaf721f97b97a7bae5da0e55110594fc84e776685e781e891a93b1fd696de78931923c83ce412c94e4f43257e6326ac0b2275cccc63be0332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0986463f3e189fc2b78255cb658c5ab
SHA1c93cdf7cebcb37415d599ee5edea73a716419f27
SHA256628c9674643222b5b212d53fbf92c23fee13c29c9626cd6ba03201e1330a2efd
SHA51250591209b7a731221f1d1ec23c0c750491882b9e15333636b9c2c45cb063741192a079e3b930bbbdf9e833bec8e2357c5181ef31aaf1998c510e6153e43375b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22ff241f3288097f4bf3d9ecd0aa648
SHA1d570ad4ce89f176a4d445e02ce47453c396849c4
SHA2565764501a5fde3406e317fc9cf173d9dca1848f453301c83c8363eb0217025d9b
SHA5124c1fb90f8816bebbc76b99f12a959b3c529f07fbb0979c09b872f424659d92226aeaab47960b7ba2b513be69690d28bdc8fbeca7c1d57f4700e20933f558738a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef4a8052a63013794dbfa86eb2528c51
SHA1f982ee2d196d78cb64946df5fef566d94dbc7bd2
SHA2569f714754c17d1a2371850b3005986b14cadfb09e26df4240940eb5fa29decf27
SHA5128cfde05c34d7a84f72dc36fbbd787b5ec55de3dfd07592cf01140e585793788a5f51ff22609fdf02c876fe6b0c48981e8e5754583561c3faa3e244f35e84474c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4824aebbecd6469a2bcc264182fe41c
SHA112548c86e644343693ca8a47c4e6f17eef05975e
SHA25648c8250d098fa6ca6a30149f1338c6741da39744397e2ce3f2b44508f6e6091d
SHA512fe314578ac4fa765c8437347c74ca22cf742bbac4897163b453b717c3dbc2bfee3c95fc6a966f905f4131884ebb835128d9451c4b692e96ba2434c95d08bd4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d030ac5bd2fbc71a0021dc6746d3530
SHA1827b36392d56dd806e1f76cd6e4ac6d086f2106b
SHA256f6c785647f8c6f3601d6ca824e8f3d6ebadec84fb97ff9f4ef7f82d3f89b1064
SHA51265f77b0868ddee1412c3c3f6d0c17e74efa75ed2a99b81b0f622a706684c994180fab6c79b7d91d44a59074319e510fb1fda06262918ad8d2088cd9d23fc1628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc469e471d906315111124bd83a135ad
SHA1421b0564df77777d132d3a81c713cbe580fc26f1
SHA25695575d16a1ad27d3fa4bf090cb8625d573e532641231777c62629184f336108b
SHA512197325d66fc208b8a839cb41bd04da899d929156c56abde756846a34e314962ee40c1ebf51a79bc10dd85983255231a1cc94815833d5da8af98aaccd870e0f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5077f356199f1fc39895433e3f8b99bca
SHA13fc28a8c4c0d5a4c7fb60c53462619154c40b3aa
SHA2569b758c422c2446a81f5dd9f924897e2498c1af36e98a6129a9f047291c608641
SHA512563b270ec58f795ef40ab59f50b02e465b291f79e7093717e661403c6bcc5b18ef1558f60044c84237ab6b12695da9ac6ce3680ff67dd1fdc0bf74b15210b21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578733692b1eb5060761aabbe9253c065
SHA1eae2d491331f64b3f4940e4403d8424d76bb22cb
SHA2561269b7fe9c262e93755693a41fc3d804c5beb1984c8eb3e971f9500ef9d9ff0a
SHA512825bcab26562f14976daa94d5b2bd9795b4fbc748a1007dc94b3d6a11fc1a752d3ed95e7e33b5620cbe14cd95d9ee1ef139ccbe38afbf591f5d79a5d194a6ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529430bdd4b565730e7604c0d5cc5b4b0
SHA15630f9b7615f9464a240f19842a8aae120fb6cc9
SHA256742e262708ec1da3c12b854a4d7610d77dd96cb09151c1e1399dc2f4cb41c9bc
SHA512070056eddd936806883fd8781beecca6837826907a8bce1676e44eb055d90ea3fa3a70c5b6fe96f8afee7448a70b1b2b1c0959cb67a48ee428c03f474279b889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a404a2a5655f4349a1743d99922c3ecc
SHA1f473f20471ffbcf9f2d886ff210e214f1c366d1f
SHA256ee710d3ad584413d694e562afdfa6d967853ac7e5914e2c39f5be85e9993aaed
SHA5124ac6b3cfa5fdbef71a7c99956e2981a47181e9182282d5e742e7e0e906893806a4377b5ca1d5484e89179cfb74df00e547850eaa29c77002f3b0941289a8cf65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b44735a0f4aab53d194c64e6a1dbdff
SHA1923ae0ea255d1f48b0f68fd5296b734666bcf77e
SHA256e7aa359ea0ddba86b1e7bfb83dd4b06dee4117f98dcdf624deec7db44eb31cd3
SHA512f27b86286fe4fa1896aa633b3001d8e6fde595f8126bf371edc7fd8e321f9b214fdcdf02cf1a83c9ab800e352a7de22a83c0acaa80debd025ec1faa0492e8c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508ea46c6346ee1e85bee246e779b52bc
SHA1c049f674d53833590f3395cc4ae679b46dd9725f
SHA2562975be4b7769da8d6176e620589801e1b9b2014c7f35dfac3ee196eff95d8117
SHA512fe0165022964e55aaf251766762a18345b15ecdb6ace46ec9c1e64a710f9eaddacd161594f815dabd84913fbc91387b153664b6efda6f1023d2c3d94d39740ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533bcb9ff8b0252f3a165c38baaaa8ba7
SHA112fc0438965a5e9f1500683314c38d2ab86a2e6f
SHA2563f8e5dacd646635e2bb253837edfcefe234196de1180cdb5bece29704132e962
SHA5127f4e7e8bc5b450c4067c23e7a5dba6329c898479c92bcb56b6031221b4e8a464f1f5c5a863f80c81282ca80d5e4954ea784c804c212080f18deeef54d6329fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a6999f038ee0ee6e18bbe0843d1b9c
SHA1b8d57ddbf274dbc71cb26dad2b854ae467384b70
SHA256149c03e43a1deadf91bd86f44abbe227737a23b416e9f4dd8b36da981ca163e9
SHA512b077e8e7d8adb5256b936c36c835fbc7602cbd5c55f210f1b62a93f9e44b0fe466296372e7cd290fc1425ffca9ed2773150ae9b8aa965b08eaf321ed1f988d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9e049eb14cbfa7ea6c6a1317b3c17f
SHA199d99fc15deb2c0ba8d64ba0ddddeaae7533a27d
SHA2560eda21c23391c42a2b59dad0b9bd1e937c02695a48aaaf22084380b54b6e627f
SHA512f066ca99fdb8b658bca7c94446c2ba307b7ef86dc8695958e2389906a1669c11b3a898f08b6cd3e6b1715025f3f1cb97806491b1dacefee4e2c613a7db1c037b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a